Blocking Is Not Just For Football-Part 2

On Wednesday we looked at IP blocking and geo-blocking as cybersecurity tactics.  Today we finish our review of blocking techniques with sender blocking and domain blocking.

Sender Blocking

Many of us are familiar with sender blocking.  Blocking an email sender, and adding them to our sender blacklist, is one of the ways that spam and phishing email filtering works.  Modern spam filters also analyze content and subject ...

Continue Reading →
0

Blocking Is Not Just For Football

Blocking is used in football to prevent the opposing defense from tackling your quarterback or running back.  In cybersecurity, blocking can be used to prevent attacks from malicious sources.  Today  and Friday we will look at several blocking tactics:  IP blocking, geo-blocking, sender blocking, and domain blocking.

IP Blocking

Every time your computer connects to another computer or web server, there is an exchange of information that happens, including an exchange of IP ...

Continue Reading →
0

Huge Worldwide WordPress Brute Force Attack

The rare Tuesday post, but this couldn’t wait.  If you are running a WordPress site, you need to know this.  This was just released by WordFence.

“Early this morning our team was woken up by systems alerts letting us know that we needed to scale up our attack logging capacity. The number of WordPress attacks we were monitoring per hour had ...

Continue Reading →
0

Hidden Web Cams in Airbnb Rentals and Hotel Rooms?

If you are traveling for the holidays, here is something else to watch for – the hidden web camera.  If you are staying at an Airbnb, or even a traditional hotel or motel over the holidays, be aware that there have been incidents where web cams have been found in the rooms.  Often they are disguised as other devices, such as the “motion ...

Continue Reading →
0

Fileless Malware Poses New Threat

There is a new threat appearing on corporate and personal networks called “fileless malware.”  It can sneak by traditional signature recognition endpoint security programs.  It is able to hide and stay resident by using trusted operating system and software application files to run the exploit.

Fileless malware exploits are estimated to comprise almost 30% of new exploits, and that percentage is rising as cyber-crime group move to this newer technology.  Fileless malware exploits are being target at financial institutions and other ...

Continue Reading →
0

DOD and NSA Internet Surveillance Archives Not Secured

Many companies and organization are moving their data repositories to the cloud, to places such as Amazon Web Services (AWS).  Hopefully, if your company is moving to the cloud, you are doing a better job securing this information than the Department of Defense or the National Security Agency.

The first story involves a trove of data left on AWS servers, and discovered by security ...

Continue Reading →
0

KeePass – Cloudless Password Management

Let’s say you have finally committed to creating new, unique, and long passwords for all your online, network, business, and machine user accounts.  How are you going to keep track of the dozens, if not hundreds of uniquely different passwords?  Using a system makes your passwords guessable, and writing them down in a spiral notebook is a hassle, and makes your ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


National Tax Security Awareness Week: IRS Helps Taxpayers Protect Against Cyber Criminals

11/28/2017 11:10 PM EST  Original release date: November 28, 2017

As part of National Tax Security Awareness Week—November 27 to December 1—the Internal Revenue Service (IRS) is releasing daily security tips to help taxpayers protect their data and identities against tax-related identity theft.

US-CERT encourages taxpayers to visit the ...

Continue Reading →
0

Integrated Password Managers – Apple iCloud Keychain

On Wednesday, we looked at the built-in password manager provided by Google Smart Lock.  Today we will review Apple’s iCloud Keychain.  Keychain works automatically with iPhones, iPads, and Macs, and is shared an updated to all your devices automatically.  Most of the Apple users I talk to are familiar with Keychain.  Keychain works with devices that are using ...

Continue Reading →
0

Integrated Password Managers – Google Smart Lock

We are advocates of using a password manager to create, manage, and securely store the dozens (or hundreds) of unique and long passwords that we need to be using these days.  For many people, password managers can seem difficult to set up and a bit of a hassle to use.  The good news its that there are two easy and built-in alternatives, Continue Reading →

0
Page 5 of 20 «...34567...»